Description
A vulnerability has been found in UTT 1250GW up to v2v3.2.2-200710. Affected by this vulnerability is the function strcpy of the file /goform/aspChangeChannel. The manipulation of the argument pvid leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Eine Schwachstelle wurde in UTT 1250GW up to v2v3.2.2-200710 gefunden. Es betrifft die Funktion strcpy der Datei /goform/aspChangeChannel. Durch Manipulation des Arguments pvid mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgeführt werden. Der Exploit steht zur öffentlichen Verfügung.
Problem types
Product status
Timeline
2025-10-06: | Advisory disclosed |
2025-10-06: | VulDB entry created |
2025-10-06: | VulDB entry last update |
Credits
cymiao (VulDB User)
References
vuldb.com/?id.327240 (VDB-327240 | UTT 1250GW aspChangeChannel strcpy buffer overflow)
vuldb.com/?ctiid.327240 (VDB-327240 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.664921 (Submit #664921 | UTT 进取 1250GW <=v2v3.2.2-200710 Buffer Overflow)
github.com/cymiao1978/cve/blob/main/10.md
github.com/cymiao1978/cve/blob/main/10.md